61
4
te c h n o l o g y
4.1 Introduction
Vulnerability assessment technology comes in multiple flavors designed
for various deployment strategies. ese strategies are largely the result
of restrictions imposed by the business-operating model. Factors such
as the distribution of facilities and organization of infrastructure have
a major influence on the technology choices made. Cost and efficiency
are also ever-present factors in any decision. e selection criteria will
be discussed in the next chapter. In this chapter, we will discuss the
variety of technologies and the unique features and issues of each.
ere are five common, industry-accepted approaches to vulner-
ability management (VM) technology:
Active scanning•
Passive assessment•
Agents•
Hy